- Web Server
- Control Panels
- Site Map/RSS Feeds
How to whitelist an IP in Fail2ban on Debian Wheezy
Fail2Ban is used to protect servers against brute force attacks. Fail2ban uses iptables to block attackers, so, if we want to add permanent IP address and never be blocked, we must add it in the config file.
Linux Basics: How to Edit Files on The Shell with Nano
Nano is a fairly versatile and user-friendly text editor that is capable of being used in a fuss-free manner by the somewhat inexperienced users too, as against the more sophisticated text editors such like Emacs and Vim. While these are excellent programs, they do have a bit of a learning curve. It works seamlessly in combination with Sudo, much to the glee of end-users.
Linux Basics: How to Download Files on the Shell With Wget
Wget is a popular and absolutely user-friendly free-utility command line tool primarily used for non-interactive downloading files from the web. wget helps users in manipulate downloading of huge chunks of data, multiple files, downloads of recursive nature, and protocol-based download (HTTP, HTTPS, and FTP). The following is the basic wget command syntax, though this tutorial covers all the possible download scenarios for the benefit of learners.
How to Set Up Apache Virtual Hosts on CentOS 6
Virtual Hosts are required in order to run multiple domains off a single IP address. Creating virtual host is expressly helpful for users who wish to run numerous sites using one virtual private server (VPS). Typically, each server is distinctly defined by it's domain/hostname. To the utter delight of users, there does not exist an upper limit to the number of virtual hosts that may be added to a VPS.
Linux Basics: How to Add and Delete Shell Users on CentOS
The process of adding and deleting shell users on a new server is a basic task every Linux user or system Administrator should know.
Linux Basics: How to Create an Apache SSL Certificate on Ubuntu
The following steps outline the process of creating an Apache SSL certificate on Ubuntu. Important to Note: 1. Users must note that it is essential to have access to root privileges on the VPS before executing the task (as explained in steps 3 and 4).
How to Add a Swap File On Ubuntu Linux
A swap file enables an operating system (OS) to utilize hard disk space to simulate additional memory. Effectively, as the system goes on the low-memory mode, it swaps a certain section of the RAM that an idle program may be using onto the hard disk to release memory capacity for other vital programs. Subsequently, when the user returns to the swapped out program, it swaps places with another program in RAM. This intelligent mix of RAM and swap files is commonly referred to as virtual memory, and its use allows the system to run a far greater number of programs than possible using only the built-in RAM.
Linux Basics: How To Create and Install SSH Keys on the Shell
SSH keys offer a highly secure manner of logging into a server with SSH as against mere dependence on a password. While a password stands the risk of being finally cracked, SSH keys are rather impossible to decipher using brute force. As a matter of fact, generating a key pair offers users two lengthy strings of characters corresponding to a public as well as a private key. Users can, thus, place the public key on any server, and subsequently unlock the same by connecting to it with a client that already possesses the private key. Upon matching up of the two keys, the system unlocks without any irksome dependence on a password. The security may be further smartly firewalled by guarding the private key with a passphrase.
How To Install The Latest Git On Ubuntu 14.04
This tutorial explains the process of installing Git on Ubuntu 14.04. For the uninitiated, Git, the client for the immensely popular GitHub, is a commonly used open source distributed version control system that was originally developed by Linus Torvalds with the objective of supporting Linux Kernel development.
Today I want to focus on a topic that can lead to huge problems of hacked accounts, spam mailings etc.: Outdated Joomla installations on your server.
Of course, this is valid for other software, too. The mentioned method should work in a similar way for other software. Since Joomla is widely spread throughout the internet, especially on shared hosting systems CMS (Content Management System), this howto will only cover Joomla so far.